Sat.Apr 18, 2020 - Fri.Apr 24, 2020

article thumbnail

What Is Agile Enterprise Architecture? Just Enough, Just in Time

erwin

Having an agile enterprise architecture (EA) is the difference between whether an organization flourishes or flounders in an increasingly changing business climate. Over the years, EA has gotten a bad reputation for not providing business value. However, frameworks and languages like TOGAF, ArchiMate and DODAF aren’t responsible for this perception.

article thumbnail

Hackers Target Oil Companies as Prices Plunge

WIRED Threat Level

The sophisticated spear-phishing campaign hit as energy companies planned their response to falling crude prices. .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nintendo Confirms Breach of 160,000 Accounts

Threatpost

After gamers reported unauthorized logins and purchases, Nintendo confirmed that over 160,000 accounts had been hacked.

article thumbnail

Remote Workforce: Securing the Next Normal

Data Breach Today

SailPoint's Mike Kiser on Rising Need for Zero Trust, Cloud Governance The global pandemic has revealed a lot about the extended remote workforce and its haves and have-nots, says Mike Kiser of SailPoint Technologies. In a preview of an upcoming virtual roundtable, he describes the cybersecurity forces shaping the new post-crisis workforce.

Security 147
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Expert identifies new Nazar APT group referenced in 2017 Shadow Brokers leak

Security Affairs

A security expert uncovered an old APT operation, tracked Nazar, by analyzing the NSA hacking tools included in the dump leaked by Shadow Brokers in 2017. Juan Andres Guerrero-Saade, a former Kaspersky and Google researcher, uncovered an old APT operation, tracked Nazar, by analyzing the NSA hacking tools included in the dump leaked by Shadow Brokers in 2017.

Libraries 105

More Trending

article thumbnail

Automated Bots Are Increasingly Scraping Data & Attempting Logins

Dark Reading

The share of bot traffic to online sites declines, but businesses are seeing an overall increase in automated scraping of data, login attempts, and other detrimental activity.

112
112
article thumbnail

A new Insomnia iOS exploit used to spy on China’s Uyghur minority

Security Affairs

Security researchers from Volexity discovered a new Insomnia iOS exploit that was being used to spy on China’s Uyghur minority. The Uyghur group is a Turkic minority ethnic group originating from and culturally affiliated with the general region of Central and East Asia. “The Uyghurs are recognized by the Chinese government only as a regional minority within a multicultural nation.

article thumbnail

IT Services Firm Cognizant Hit with Maze Ransomware

Dark Reading

Cognizant is working with cyber defense firms and law enforcement to investigate the attack, disclosed April 17.

IT 104
article thumbnail

Secure Together: Netflix scams and how to report suspicious emails

IT Governance

With the UK government recently confirming that the lockdown will be extended for a further three weeks, we hope you’re comfortable in your remote work set-up – or, at least, as comfortable as one can hope. The isolation will be challenging in the best of situations, but plenty of people – such as those with children or unruly housemates – are facing a particularly tough time.

Security 108
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Attackers Increasingly Using Web Shells to Create Backdoors

Data Breach Today

NSA, Australian Signals Directorate, Offer Mitigation Tips The U.S. National Security Agency and the Australian Signals Directorate offer guidance on how to mitigate the growing threat posed by attackers using web shells to create backdoors.

Security 251
article thumbnail

Hacking Apple iPhones and iPads by sending emails to the victims

Security Affairs

Two zero-day flaws in the default mailing app pre-installed on iPhones and iPads allow attackers to hack the devices just by sending emails. Experts at cybersecurity firm ZecOps have discovered two zero-day vulnerabilities in iPhone and iPad devices that have been exploited in a series of attacks that targeted iOS high-profile users since at least January 2018.

Libraries 110
article thumbnail

A Dozen Nation-Backed APTs Tap COVID-19 to Cover Spy Attacks

Threatpost

Iran's Charming Kitten and other nation-state actors are using the coronavirus pandemic to their advantage, for espionage.

article thumbnail

COVID-19 Caption Contest Winners

Dark Reading

It was a tough choice! And the winner is.

IT 78
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Expert discloses 4 zero-days in IBM Data Risk Manager

Security Affairs

A security researcher disclosed details of four zero-day flaws impacting an IBM security product after the IT giant refused to address them. The security researcher Pedro Ribeiro, Director of Research at Agile Information Security, has published details about four zero-day vulnerabilities affecting the IBM Data Risk Manager (IDRM) after the company refused to address the issues.

Risk 95
article thumbnail

Genetic Testing Lab Hack Affects 233,000

Data Breach Today

Second Largest Health Data Breach So Far This Year A California-based genetic testing laboratory has reported an email hacking incident that may have exposed medical information on nearly 233,000 individuals. It's the second-largest health data breach posted to the federal health data breach tally so far in 2020.

article thumbnail

When in Doubt: Hang Up, Look Up, & Call Back

Krebs on Security

Many security-conscious people probably think they’d never fall for a phone-based phishing scam. But if your response to such a scam involves anything other than hanging up and calling back the entity that claims to be calling, you may be in for a rude awakening. Here’s how one security and tech-savvy reader got taken for more than $10,000 in an elaborate, weeks-long ruse.

Phishing 358
article thumbnail

How to Bring Business Process Management to Your Business

AIIM

Businesses looking for ongoing growth and scalability try to achieve these goals through different approaches that can provide “that extra advantage.” One such approach is business process management , which aims to find and make ongoing improvements in the operations of a business. This is currently a popular tactic in the business world, featuring various applications, techniques, and tools which make it a complex field of business development.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

267 Million Facebook identities available for 500 euros on the dark web

Security Affairs

Over 267 million Facebook profiles are offered for sale on dark web sites and hacker forums, the dump is offered for ÂŁ500 ($623) and doesn’t include passwords. Hackers are offering for sale over 267 million Facebook profiles for ÂŁ500 ($623) on dark web sites and hacker forums, the archive doesn’t include passwords. Early March, the security expert Bob Diachenko uncovered an Elasticsearch cluster containing more than 267 million Facebook user IDs, phone numbers, and names.

Sales 145
article thumbnail

Cognizant: Ransomware Attack Disrupting Services

Data Breach Today

SEC Filing Shows Company Still Assessing Maze Attack IT services and consulting giant Cognizant is still assessing the damage from a ransomware attack on Friday. And it's warning that the incident is disrupting services to some of its clients and could affect the company's revenue.

article thumbnail

White-Hat Hackers Help 'Fold' COVID-19 Proteins

Dark Reading

A grassroots effort provides scientists with computing power to help simulate the novel coronavirus' proteins and come up with therapeutic solutions for the disease.

145
145
article thumbnail

CNIL’s New Guidelines on HR Processing

HL Chronicle of Data Protection

The French Data Protection Authority (CNIL) has recently released new guidelines (French only) regarding human resources processing operations. When the GDPR became effective, the CNIL’s previous set of HR Data guidelines became out of date as they did not incorporate the new law’s requirements ( e.g. obligations relating to records of processing activities and Data Protection Impact Assessments).

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Cyberattack reports quadrupled during Coronavirus outbreak, FBI warns

Security Affairs

The FBI announced that the number of cybercrime reports is spiked since the beginning of the Coronavirus (COVID-19) pandemic. Speaking at the Aspen Institute, FBI Deputy Assistant Director Tonya Ugoretz, announced that the bureau has observed a spike in cybercrime reports since the beginning of the C oronavirus pandemic. The FBI official explained that the number of reports has quadrupled compared to months before the COVID-19 outbreak. “The FBI has an Internet Crime Complaint Center, the

article thumbnail

Prosecutors: Insider 'Sabotaged' Medical Equipment Shipments

Data Breach Today

Hacker Disrupted Delivery of Supplies Used in COVID-19 Crisis, DOJ Says The former vice president of finance at a Georgia-based medical supplies company has been charged with hacking into the firm's computers and "sabotaging" shipment of personal protective equipment in the midst of the COVID-19 crisis.

330
330
article thumbnail

5 best practices to maximizing your EIM investment

OpenText Information Management

As the volume and variety of data in every business explodes, Enterprise Information Management (EIM) solutions are becoming an increasingly vital part of the IT infrastructure. Estimates suggest that the market for EIM solutions will reach $70 billion by 2025. Yet, organizations often struggle to achieve full benefit from their EIM investments. Attaining the benefits … The post 5 best practices to maximizing your EIM investment appeared first on OpenText Blogs.

Marketing 127
article thumbnail

New Research Shows Why and How Zoom Could Become an Advertising Driven Business

John Battelle's Searchblog

As the coronavirus crisis built to pandemic levels in early March, a relatively unknown tech company confronted a defining opportunity. Zoom Video Communications , a fast-growing enterprise videoconferencing platform with roots in both Silicon Valley and China, had already seen its market cap grow from under $10 billion to nearly double that. As the coronavirus began dominating news reports in the western press, Zoom announced its first full fiscal year results as a public company.

Privacy 115
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

State-sponsored hackers are using COVID-19 lures, Google warns

Security Affairs

Google warns that nation-backed hackers are exploiting the COVID-19 pandemic to organizations involved in the fight against the pandemic. Google is warning that nation-state actors are exploiting the COVID-19 (Coronavirus) pandemic to target health care organizations and entities involved in the fight against the pandemic. Google’s Threat Analysis Group (TAG) shared its latest findings related to state-backed attacks and revealed that it has identified more than a dozen state-sponsored groups us

Phishing 126
article thumbnail

Cybercriminals Using Zoom, WebEx as Phishing Lures: Report

Data Breach Today

Campaigns Aimed at Stealing Credentials, Distributing Malware Cybercriminals are using spoofed messages and images from Zoom and Cisco WebEx as lures in new phishing campaigns that are designed to steal credentials or distribute malware, according to the security firm Proofpoint.

Phishing 314
article thumbnail

Federal Government is Excelling at Digital Transformation While Security Challenges Gain Ground

Thales Cloud Protection & Licensing

As the U.S. federal government contends with a tidal wave of demands in the COVID-19 battle, agencies are pushed to unprecedented limits. Some good news: the U.S. government is excelling with digital transformation (DX) which is critical in this time of crisis as the cloud becomes a crucial dynamic with the world working remotely. New digital capabilities are enabling data to be more fully utilized.